OpenStack provides a standard framework for cloud delivery, but it's not a product. Piston Cloud, launched by co-Founder and CEO Joshua McKenty, provides that product, making it easy to configure and deploy a private cloud.

This year’s Unwired Innovation Expo (UIE) in Clovis, New Mexico was simply amazing. By now, we’re all a bit desensitized to the wonder of wireless technology, and easily forget that under the hood of our WLAN environments lives some impressive core technology. It takes an event like the UIE to really remind us of just how empowering the wireless industry is to innovative products, and the minor miracles that are possible when our wireless engine is running right. Here’s a look

Arista, already known for its ultra low latency switches, unveiled its AppSwitch 7124FX. Andy Bechtolsheim, the company's founder, and CDOr, and one of the valley's most decorated entrepreneurs explains the importance of this new offering.

OpenStack provides a standard framework for cloud delivery, but it's not a product. Piston Cloud, launched by co-Founder and CEO Joshua McKenty, provides that product, making it easy to configure and deploy a private cloud.

Arista, already known for its ultra low latency switches, unveiled its AppSwitch 7124FX. Andy Bechtolsheim, the company's founder, and CDOr, and one of the valley's most decorated entrepreneurs explains the importance of this new offering.

Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That's double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006.

Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well.

The Information Security Forum this week released a report titled 'Threat Horizon 2014' that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at 'Internal Threats', which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an o

One of the easiest things an organization can do to help increase the security posture of their infrastructure is to implement a policy and standard for secure management. Often overlooked, or not fully executed, this is what I consider to be the low hanging fruit of network security.

As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountab

Having a company owned certificate authority makes managing your network devices simpler and more secure. There is nothing inherently wrong with self-signed certs, but you can do better. You can build a CA issue your first certificate in about 10 minutes. Here is how to do it.

An infrastructure-as-a-service (IaaS) provider, Tier 3, is partnering with data center services provider Equinix to enable enterprises to run a private cloud computing environment on a public cloud service. The idea is to help customers take advantage of the cost efficiency and flexibility offered by public cloud computing, while protecting them from worries about multitenancy and security that give so many enterprises pause.

You don't have to turn your storage area network upside down, with performance-sensitive data moved into the server on a flash-memory device. If you can fix its performance issues, the SAN has distinct advantages over server-side caching.

Carriers like AT&T and Verizon Wireless are using data caps to manage the explosive growth in 3G/4G data consumption. Hey, kids--the 1990s called and wants its bandwidth management strategy back. As Lee Badman points out in "4G? No, It's More Like 4Gee!" the data rates available to wireless consumers are growing rapidly and our demand is keeping pace. When you have high demand and data caps, the chance of overages is very likely, and the last thing anyone wants is out-of-control telecom costs. C

HP and Polycom are taking their partnership to a new level, combining HP’s networking technology and Polycom’s videoconferencing products to deliver Microsoft’s Lync unified communications platform to the enterprise. An HP representative says that while many Lync licenses have been sold by Microsoft, several of those deployments are on hold because of the complexity of integrating the three elements--complexity that the two partners aim to address.

Everyone I know who writes about technology has developed an extensive custom dictionary file for Microsoft Office. Sometimes it seems every third word I write is a company, product name or some piece of tech jargon that Word doesn't recognize. Since I work on several different computers, I use SugarSync to keep my custom dictionary up to date.

Applications and initiatives like private cloud computing, virtualization and mobility are placing increasing pressure on network infrastructure to be faster and more capable. Initiatives like software-defined networking and protocols such as OpenFlow can make the network more flexible and manageable, but they don’t really solve the problem of application performance where high-speed, low-latency requirements are the rule. Only by removing hops and their attendant latency from the network

Server manufacturers have been quick to roll out new models designed to run on Intel’s new Xeon E5 family of processors, a.k.a. Romley, which touts an 80% performance improvement over earlier Xeon versions. As surely as the knee bone’s connected to the thigh bone, a boost in server performance is going to demand a bigger network pipeline. Networking vendors and other industry experts think the introduction of Romley is going to be a significant catalyst for adoption of 10-Gigabit Eth

Have you actually held a 4G device in your hands while it does a speed test? Has your brain struggled to reconcile the numbers displayed at the end of the test with the fact that you’re connected to a mobile network and not Wi-Fi? Have you felt your reality get pleasantly rocked in a way that left you a bit confounded over the numbers that your device was showing you? This 4G stuff is simply amazing.

What could be worse for IT departments than grappling with the issues related to Y2K? Ask a U.S. healthcare provider within the context of its top IT priorities for 2012 and the response may be government-mandated compliance.

IT departments looking to put up private cloud environments in a hurry, and without some of the complexity usually associated with cloud infrastructure, would do well to take a look at Piston Cloud from Piston Cloud Computing.

Do you think penetration testers--the people that companies hire to break into organizations and test their defenses--remain immersed in the pale glow of a stack of monitors listening to techno and mainlining over-caffeinated fruit drinks? I was visiting Steve Stasikounis, CEO of Secure Network Technologies and Dark Reading contributor, last week in his offices, and he couldn't help showing off his latest penetration testing and forensic investigation tools.

Security is one of the biggest concerns and challenges for today’s interconnected systems, regardless of the network type deployed. However, the intricacies of flat networks bring new nuances to best security practices, which can be addressed by combining common sense with some industry-leading strategies.

Today’s networks are awash in traffic, making it difficult for administrators to find what is pertinent when diagnosing network packets for security issues and performance. Those harried administrators can turn to the latest smart taps to ease their packet gathering chores.

Quantum, a provider of data protection and big data management, has announced a software platform to help customers take advantage of cloud-based data protection, using its vmPro technology and newly launched virtual deduplication appliance, DXi V1000. The company has also partnered with Xerox, which will use its underlying technology for its cloud backup and disaster recovery services.

Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.

Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.